E1.2 recognizes guidelines for safety and security
E1.3 authorship of intellectual property
E2.2 safety guidelines when communicating electronically
E2.3 explains consequences of unethical behavior
3.1 evaluates effects of personal ICT behavior on others
E3.2 weighs personal benefits and risks of using ICT
Teacher will discuss with the whole class what they think the internet is.
In their groups – students will put down their thoughts and ideas on what they think the internet is.
Watch the video on what is the internet – are there any errors in the presentation (500 billion users???) – Diligence and common sense need to be stressed!!!
Students will create a poster (electronically or on paper) on what they think the internet is, based on the information from the video i.e.:
i.Network ii.Communication tool iii.A “history” piece iv.Fact sheet on the internet – number of users etc.
i.How many students ii.What they use MSN etc. iii.What do they KNOW about the dangers of chatting
Students will watch the video on chatting
Students will take notes and use the information from the video. Students will prepare an electronic brochure with an emphasis on safety:
i.Include what it is ii.Do’s and Don’ts iii.Safety checklist
Joe Cool or Joe Fool – have your students take the cyber tour and then do the on-line cyber-quiz to see what they learned. Tell your students that they have to get at least 16 out of 20 on the test before they can go on to the next activity. Students should understand some key questions:
What kind of Web site is this?
What is its purpose: To inform? To sell? To entertain? To persuade?
Is it a commercial Web site?
Is it a personal home page?
Is it an educational site?
How can students tell?
Does Jo make the right decision? Why or why not?
Internet Safety Plans – There are three core objectives for internet safety plans. Under three headings – “personal-protective-tell”, ask your students to brainstorm rules and guidelines that should be part of the “core objectives”. Have your students do a self-analysis writing on “How Safe Are You - in comparison to what they should be - based on the internet safety plan objectives. You may need to guide the process along to make sure that they get the following concepts:
Personal Responsibility
i.Do not give out your name, address, telephone number, age, e-mail address to strangers ii.Do not send your picture to a stranger iii.Do not meet in person someone that you have met online iv.Don’t use or respond to inappropriate language v.Don’t go into chat rooms *
Protective Technologies
i.Use filtering software ii.Use antivirus software, software that will block Trojans iii.use a firewall iv.don’t use a web cam v.Don’t add strangers to your buddy list; block strangers vi.Save conversations/e-mail vii.Turn off your computer and web cam when not using them
Tell a Responsible Adult
i.Parent, Police Officer, Teacher
Cell Phone Etiquette: There comes a time in any technological revolution when some basic guidelines need to be looked at. It happened when e-mail exploded on the scene and people started to learn some basic dos and don'ts around the new medium. Cell phones/cameras and text messaging are becoming a larger part of our (students) lives.
The following is a list of some possible “Ten Commandments” of cell phone usage.”
Thou shall not subject defenseless others to cell phone conversations. When people cannot escape your phone conversation, such as in a meeting, at a restaurant, on a grounded airplane, or at the dinner table, you should spare them. People around you should have the option of not listening. If they don't, you shouldn't be babbling.
Thou shall not set thy ringer to play La Cucaracha ON HIGH every time thy phone rings. Or Beethoven's Fifth, or the Bee Gees, or any other annoying melody. Is it not enough that phones go off every other second? Now we have to listen to synthesized nonsense?
Thou shall turn thy cell phone off during public performances, weddings, funerals, concerts etc...
Thou shall not take a picture of anyone without their permission with your cell phone camera.
Thou shall not dial while driving or talk on the phone while driving.
Thou shall not text message friends’ answers to tests and quizzes in school.
Thou shall not speak louder on thy cell phone than thou would on any other phone. Cell phones have incredibly sensitive microphones, and it's gotten to the point where you can tell if someone is calling from a cell because of the way they are talking, not how it sounds. If your signal cuts out, speaking louder won't help, unless the person is actually within earshot.
Thou shall not grow too attached to thy cell phone. For obvious reasons, a dependency on constant communication is not healthy. Leave the cell phone / text messaging off for awhile.
Thou shall leave your cell phone OFF when in school
Thou shall configure your cell phone for geographic locations!
Go over the list with your students, and have your students create their own commandments or prioritize these.Have them create a poster that shows one of the “commandments”
Cyber Bullying: Have your students go to do the following web quest and use the information they find to answer the questions that they find on the web page. Students will have to create a power point presentation based on the web quest.
Allies and Aliens - A Mission in Critical Thinking - This interactive module for Grades 7 and 8 is designed to increase students’ ability to recognize bias, prejudice and hate propaganda on the Internet and in other media. In Allies and Aliens students become agents on an intergalactic mission for earth. As students interact with alien characters and visit Web sites on the "Galactic Web", they come across varying degrees of prejudice and discrimination. These interactions help students to understand how such messages can promote hate.
Mirror Image – It is recommended that the students work through the software together as a whole class.
"Google in a sense is a symbol of the solution to an old problem. We don't need more Googles; what we need is a way to prioritize and analyze and make sense of the information we have at our fingertips. And maybe those kinds of solutions aren't technological at all. I'm quite prepared for the possibility that the next revolution is not going to come from a machine; it's going to come from creating a more thoughtful work force and giving people the opportunity to be thoughtful." - Malcolm Gladwell (Globe and Mail Oct. 1, 2007)**
3N Digital Citizenship and Internet Safety (With Dana Corr): Back to Home
This link will take you to my Internet Safety Homepage
Internet Safety For BYTE Feb. 29 MinnedosaDid You Know?
By
Karl Fisch – Arapahoe High School
LwICT:
E1.2 recognizes guidelines for safety and security
E1.3 authorship of intellectual property
E2.2 safety guidelines when communicating electronically
E2.3 explains consequences of unethical behavior
3.1 evaluates effects of personal ICT behavior on others
E3.2 weighs personal benefits and risks of using ICT
Grade 7 E.L.A. G.L.O.’s -1, 2+3
Safety Centers
- What is the internet: (Click here for video)
- Teacher will discuss with the whole class what they think the internet is.
- In their groups – students will put down their thoughts and ideas on what they think the internet is.
- Watch the video on what is the internet – are there any errors in the presentation (500 billion users???) – Diligence and common sense need to be stressed!!!
- Students will create a poster (electronically or on paper) on what they think the internet is, based on the information from the video i.e.:
i. Networkii. Communication tool
iii. A “history” piece
iv. Fact sheet on the internet – number of users etc.
- What is chatting: (Click here for video)
- Teacher will collect basic data on chatting:
i. How many studentsii. What they use MSN etc.
iii. What do they KNOW about the dangers of chatting
- Students will watch the video on chatting
- Students will take notes and use the information from the video. Students will prepare an electronic brochure with an emphasis on safety:
i. Include what it isii. Do’s and Don’ts
iii. Safety checklist
- Personal Responsibility
i. Do not give out your name, address, telephone number, age, e-mail address to strangersii. Do not send your picture to a stranger
iii. Do not meet in person someone that you have met online
iv. Don’t use or respond to inappropriate language
v. Don’t go into chat rooms *
- Protective Technologies
i. Use filtering softwareii. Use antivirus software, software that will block Trojans
iii. use a firewall
iv. don’t use a web cam
v. Don’t add strangers to your buddy list; block strangers
vi. Save conversations/e-mail
vii. Turn off your computer and web cam when not using them
- Tell a Responsible Adult
i. Parent, Police Officer, TeacherThe following is a list of some possible “Ten Commandments” of cell phone usage.”
Go over the list with your students, and have your students create their own commandments or prioritize these. Have them create a poster that shows one of the “commandments”
"Google in a sense is a symbol of the solution to an old problem. We don't need more Googles; what we need is a way to prioritize and analyze and make sense of the information we have at our fingertips. And maybe those kinds of solutions aren't technological at all. I'm quite prepared for the possibility that the next revolution is not going to come from a machine; it's going to come from creating a more thoughtful work force and giving people the opportunity to be thoughtful."
- Malcolm Gladwell (Globe and Mail Oct. 1, 2007)**